A source location privacy protection method based on dynamic phantom node strategy
A phantom node, privacy protection technology, applied in the direction of location information-based services, specific environment-based services, security devices, etc., can solve the problems of complex data transmission paths, data packet transmission delay and large node energy consumption, etc. Achieve the effect of improving high randomness, controlling energy consumption and avoiding loop routing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to be able to describe the technical content of the present invention more clearly, further description is given below with reference to specific examples.
[0055] refer to Figure 1 to Figure 5 , a source location privacy protection method for dynamic phantom node strategy, this method aims at the source location privacy protection problem in wireless sensor networks, considers the visible area and hierarchy to construct candidate phantom node regions, and uses partition-based phantom node scheduling The strategy improves privacy security strength by maximizing the randomness of phantom node locations without extending the transmission path. When constructing the backbone route, the remaining energy of the node and the number of neighbor nodes are considered, and the optimal path is selected by analyzing the captured probability of the node. At the same time, the nodes on the transmission path always forward data packets in the direction of the sink node, av...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


